l2tAuthenticateIncomingTunnelSetupRequests - l2t Authenticate Incoming Tunnel Setup Requests - ibm-ibml2tp

MIBs list

With IPHost Network Monitor you can run simple snmp requests against a IBM device in your network.

l2tAuthenticateIncomingTunnelSetupRequests

l2t Authenticate Incoming Tunnel Setup Requests
1.3.6.1.4.1.2.6.119.4.7.1.1.2

Defines whether the L2T protocol stack will REQUIRE the CHAP-like authentication mechanism to be present in all tunnel setup requests.

Back to ibm-ibml2tp MIB page.

IPHost Network monitor allows you to monitor l2tAuthenticateIncomingTunnelSetupRequests on IBM device via the SNMP protocol. Download IPHost Network Monitor (500 monitors for 30 days, 50 monitors free forever) to start monitoring IBM Flex systems right now.

MIBs list